{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:27:36Z","timestamp":1730212056863,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,10]],"date-time":"2023-12-10T00:00:00Z","timestamp":1702166400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,10]],"date-time":"2023-12-10T00:00:00Z","timestamp":1702166400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,10]]},"DOI":"10.1109\/cvmi59935.2023.10465194","type":"proceedings-article","created":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T18:12:20Z","timestamp":1710958340000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Unlinkability of Biometric Templates Using Hierarchical Deterministic Wallets"],"prefix":"10.1109","author":[{"given":"Katakam","family":"Mallikarjun","sequence":"first","affiliation":[{"name":"Atal Bihari Vajpayee-Indian Institute of Information Technology and Management,Gwalior,India,474015"}]},{"given":"Jeevaraj","family":"S.","sequence":"additional","affiliation":[{"name":"Atal Bihari Vajpayee-Indian Institute of Information Technology and Management,Gwalior,India,474015"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/107621758500800421"},{"journal-title":"European comission smart borders - background","year":"2013","author":"Comission","key":"ref2"},{"journal-title":"Regulation (eu) 2016\/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (general data protection regulation) (text with eea relevance)","year":"2016","author":"Parliament","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18621-4_12"},{"issue":"06","key":"ref5","article-title":"Cancelable biometrics: a comprehensive survey","volume":"53","author":"Rawat","year":"2020","journal-title":"Artificial Intelligence Review"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"ref7","first-page":"423","volume-title":"Privacy and Security Enhancements in Biometrics","author":"Boult","year":"2008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015MUP0007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40246-3_22"},{"key":"ref10","first-page":"171","article-title":"A two-factor protection scheme for mcc fingerprint templates","volume-title":"Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI)","author":"Ferrara"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2016.11.008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712709"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2008-512"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11527923_45"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1053-6_7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.15"},{"key":"ref17","first-page":"1","article-title":"On securing ieee 802.15.4 networks through a standard compliant frame-work","author":"Sciancalepore","journal-title":"EMTC"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/784834"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2788000"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CSF49147.2020.00020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2019.06.001"}],"event":{"name":"2023 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)","start":{"date-parts":[[2023,12,10]]},"location":"Gwalior, India","end":{"date-parts":[[2023,12,11]]}},"container-title":["2023 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10464390\/10464398\/10465194.pdf?arnumber=10465194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T20:10:02Z","timestamp":1711483802000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10465194\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cvmi59935.2023.10465194","relation":{},"subject":[],"published":{"date-parts":[[2023,12,10]]}}}